Which of the following protocols uses public-key cryptography to authenticate the remote
computer?
A.
SSH
B.
Telnet
C.
SCP
D.
SSL
Which of the following protocols uses public-key cryptography to authenticate the remote
computer?
Which of the following protocols uses public-key cryptography to authenticate the remote
computer?
A.
SSH
B.
Telnet
C.
SCP
D.
SSL